reflection attacks - uses network systems functioning normally
the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system, when the intermediary responds, the response is sent to the target - relfects the attack off the intermediary